My work lives at the intersection of vulnerability research, secure software design,
proof-driven reporting, and technical product building. I enjoy digging into source code,
reasoning about exploitability, and turning findings into clear technical narratives that include root cause,
realistic threat models, impact framing, and remediation paths.
Source Code Review
PoC Development
Threat Modeling
Patch Validation
Coordinated Disclosure
Developer Workflow
I care about findings that are technically honest and practically useful. That means no inflated claims, no weak assumptions,
and no vague impact language. I prefer reproducible evidence, exact code paths, realistic attacker models, and fixes that fit maintainers' codebases.
Precision
Root-cause-first analysis with technical clarity and clean reproduction paths.
Execution
Move from idea to report, patch, PR, or advisory without losing depth.